

Such files require the Java Runtime Environment, and for that reason the malicious.

XLoader is likely distributed by mail spam jar file appears to be distributed as an attachment in a phishing lure, such as in this document Statement SKBMT 09818.jar. The macOS sample we analyzed comes as both a standalone binary and as a compiled. XLoader for Mac – Java Runtime For the Steal

In this post, we take an initial look at the macOS version of XLoader, describe its behavior and show how XLoader can be detected on Apple’s Mac platform. Unlike its Windows-only predecessor, XLoader targets both Windows and macOS. The latest such threat to come to attention is XLoader, a Malware-as-a-Service info stealer and keylogger that researchers say was developed out of the ashes of FormBook. Threats that can be compiled on one platform but produce executables targeting many are a productivity boon to criminals, who now operate in an increasingly competitive environment trying to sell their wares. Threat actors have come to recognize the reality that today’s organizations operate fleets of devices encompassing all the major OS vendors – Apple, Microsoft, Google and many flavors of Linux – and are adapting accordingly.
